====================================================== WARNING: possible circular locking dependency detected syzkaller #0 Not tainted ------------------------------------------------------ syz.2.181/5557 is trying to acquire lock: ffff888027422990 (jbd2_handle){++++}-{0:0}, at: jbd2_journal_lock_updates+0x8f/0x390 fs/jbd2/transaction.c:880 but task is already holding lock: ffff8880546ed108 (&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#8){+.+.}-{3:3}, at: inode_lock include/linux/fs.h:758 [inline] ffff8880546ed108 (&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#8){+.+.}-{3:3}, at: ocfs2_flush_truncate_log+0x43/0x60 fs/ocfs2/alloc.c:6075 which lock already depends on the new lock. the existing dependency chain (in reverse order) is: -> #4 (&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#8){+.+.}-{3:3}: down_write+0x36/0x60 kernel/locking/rwsem.c:1573 inode_lock include/linux/fs.h:758 [inline] ocfs2_remove_btree_range+0x674/0x15e0 fs/ocfs2/alloc.c:5742 ocfs2_remove_inode_range+0xf37/0x2740 fs/ocfs2/file.c:1907 __ocfs2_change_file_space+0x8a8/0xe90 fs/ocfs2/file.c:2028 ocfs2_fallocate+0x1ee/0x240 fs/ocfs2/file.c:2138 vfs_fallocate+0x584/0x6f0 fs/open.c:323 ksys_fallocate fs/open.c:346 [inline] __do_sys_fallocate fs/open.c:354 [inline] __se_sys_fallocate fs/open.c:352 [inline] __x64_sys_fallocate+0xbd/0x100 fs/open.c:352 do_syscall_x64 arch/x86/entry/common.c:46 [inline] do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:76 entry_SYSCALL_64_after_hwframe+0x68/0xd2 -> #3 (&ocfs2_quota_ip_alloc_sem_key){++++}-{3:3}: down_write+0x36/0x60 kernel/locking/rwsem.c:1573 ocfs2_create_local_dquot+0x1a5/0x18e0 fs/ocfs2/quota_local.c:1224 ocfs2_acquire_dquot+0x7c6/0xb20 fs/ocfs2/quota_global.c:871 dqget+0x778/0xeb0 fs/quota/dquot.c:988 __dquot_initialize+0x3c3/0xcd0 fs/quota/dquot.c:1517 ocfs2_get_init_inode+0x144/0x1b0 fs/ocfs2/namei.c:202 ocfs2_mknod+0x8c8/0x25b0 fs/ocfs2/namei.c:310 ocfs2_mkdir+0x1b6/0x4b0 fs/ocfs2/namei.c:657 vfs_mkdir+0x387/0x570 fs/namei.c:4114 do_mkdirat+0x1d8/0x440 fs/namei.c:4139 __do_sys_mkdirat fs/namei.c:4154 [inline] __se_sys_mkdirat fs/namei.c:4152 [inline] __x64_sys_mkdirat+0x85/0x90 fs/namei.c:4152 do_syscall_x64 arch/x86/entry/common.c:46 [inline] do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:76 entry_SYSCALL_64_after_hwframe+0x68/0xd2 -> #2 (&dquot->dq_lock){+.+.}-{3:3}: __mutex_lock_common kernel/locking/mutex.c:603 [inline] __mutex_lock+0x12d/0xaf0 kernel/locking/mutex.c:747 dquot_commit+0x5a/0x410 fs/quota/dquot.c:507 ext4_write_dquot+0x1f0/0x360 fs/ext4/super.c:6811 mark_dquot_dirty fs/quota/dquot.c:372 [inline] mark_all_dquot_dirty+0xf9/0x400 fs/quota/dquot.c:412 __dquot_alloc_space+0x5fc/0xe60 fs/quota/dquot.c:1752 dquot_alloc_space_nodirty include/linux/quotaops.h:300 [inline] dquot_alloc_space include/linux/quotaops.h:313 [inline] dquot_alloc_block include/linux/quotaops.h:337 [inline] ext4_mb_new_blocks+0xfc4/0x4610 fs/ext4/mballoc.c:5740 ext4_ext_map_blocks+0x195a/0x6870 fs/ext4/extents.c:4403 ext4_map_blocks+0x9de/0x1b70 fs/ext4/inode.c:679 _ext4_get_block+0x1e7/0x540 fs/ext4/inode.c:822 ext4_block_write_begin+0x644/0x1300 fs/ext4/inode.c:1124 ext4_write_begin+0x629/0xf80 fs/ext4/ext4_jbd2.h:-1 pagecache_write+0x20a/0x380 fs/ext4/verity.c:85 ext4_write_verity_descriptor fs/ext4/verity.c:185 [inline] ext4_end_enable_verity+0x1cb/0x570 fs/ext4/verity.c:210 enable_verity+0x1a30/0x2040 fs/verity/enable.c:298 fsverity_ioctl_enable+0x40c/0x4b0 fs/verity/enable.c:392 __ext4_ioctl fs/ext4/ioctl.c:1583 [inline] ext4_ioctl+0x1aab/0x4160 fs/ext4/ioctl.c:1617 vfs_ioctl fs/ioctl.c:51 [inline] __do_sys_ioctl fs/ioctl.c:870 [inline] __se_sys_ioctl+0xfa/0x170 fs/ioctl.c:856 do_syscall_x64 arch/x86/entry/common.c:46 [inline] do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:76 entry_SYSCALL_64_after_hwframe+0x68/0xd2 -> #1 (&ei->i_data_sem){++++}-{3:3}: down_write+0x36/0x60 kernel/locking/rwsem.c:1573 ext4_truncate+0x999/0x1240 fs/ext4/inode.c:4286 ext4_setattr+0x10cb/0x19f0 fs/ext4/inode.c:5645 notify_change+0xc74/0xf40 fs/attr.c:499 do_truncate+0x1ac/0x240 fs/open.c:65 do_sys_ftruncate+0x312/0x3c0 fs/open.c:193 do_syscall_x64 arch/x86/entry/common.c:46 [inline] do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:76 entry_SYSCALL_64_after_hwframe+0x68/0xd2 -> #0 (jbd2_handle){++++}-{0:0}: check_prev_add kernel/locking/lockdep.c:3090 [inline] check_prevs_add kernel/locking/lockdep.c:3209 [inline] validate_chain kernel/locking/lockdep.c:3825 [inline] __lock_acquire+0x2d07/0x7d10 kernel/locking/lockdep.c:5049 lock_acquire+0x1bb/0x4a0 kernel/locking/lockdep.c:5662 jbd2_journal_lock_updates+0xa8/0x390 fs/jbd2/transaction.c:880 __ocfs2_flush_truncate_log+0x2cf/0x1220 fs/ocfs2/alloc.c:6029 ocfs2_flush_truncate_log+0x4b/0x60 fs/ocfs2/alloc.c:6076 ocfs2_sync_fs+0x119/0x330 fs/ocfs2/super.c:402 sync_filesystem+0x1be/0x220 fs/sync.c:66 ocfs2_remount+0x115/0xb70 fs/ocfs2/super.c:611 reconfigure_super+0x219/0x8a0 fs/super.c:977 do_remount fs/namespace.c:2741 [inline] path_mount+0xe13/0x1020 fs/namespace.c:3400 do_mount fs/namespace.c:3421 [inline] __do_sys_mount fs/namespace.c:3629 [inline] __se_sys_mount+0x2e3/0x3d0 fs/namespace.c:3606 do_syscall_x64 arch/x86/entry/common.c:46 [inline] do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:76 entry_SYSCALL_64_after_hwframe+0x68/0xd2 other info that might help us debug this: Chain exists of: jbd2_handle --> &ocfs2_quota_ip_alloc_sem_key --> &ocfs2_sysfile_lock_key[args->fi_sysfile_type]#8 Possible unsafe locking scenario: CPU0 CPU1 ---- ---- lock(&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#8); lock(&ocfs2_quota_ip_alloc_sem_key); lock(&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#8); lock(jbd2_handle); *** DEADLOCK *** 2 locks held by syz.2.181/5557: #0: ffff88807cf040e0 (&type->s_umount_key#55){+.+.}-{3:3}, at: do_remount fs/namespace.c:2738 [inline] #0: ffff88807cf040e0 (&type->s_umount_key#55){+.+.}-{3:3}, at: path_mount+0xdd1/0x1020 fs/namespace.c:3400 #1: ffff8880546ed108 (&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#8){+.+.}-{3:3}, at: inode_lock include/linux/fs.h:758 [inline] #1: ffff8880546ed108 (&ocfs2_sysfile_lock_key[args->fi_sysfile_type]#8){+.+.}-{3:3}, at: ocfs2_flush_truncate_log+0x43/0x60 fs/ocfs2/alloc.c:6075 stack backtrace: CPU: 0 PID: 5557 Comm: syz.2.181 Not tainted syzkaller #0 Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 02/12/2026 Call Trace: dump_stack_lvl+0x188/0x24e lib/dump_stack.c:106 check_noncircular+0x296/0x330 kernel/locking/lockdep.c:2170 check_prev_add kernel/locking/lockdep.c:3090 [inline] check_prevs_add kernel/locking/lockdep.c:3209 [inline] validate_chain kernel/locking/lockdep.c:3825 [inline] __lock_acquire+0x2d07/0x7d10 kernel/locking/lockdep.c:5049 lock_acquire+0x1bb/0x4a0 kernel/locking/lockdep.c:5662 jbd2_journal_lock_updates+0xa8/0x390 fs/jbd2/transaction.c:880 __ocfs2_flush_truncate_log+0x2cf/0x1220 fs/ocfs2/alloc.c:6029 ocfs2_flush_truncate_log+0x4b/0x60 fs/ocfs2/alloc.c:6076 ocfs2_sync_fs+0x119/0x330 fs/ocfs2/super.c:402 sync_filesystem+0x1be/0x220 fs/sync.c:66 ocfs2_remount+0x115/0xb70 fs/ocfs2/super.c:611 reconfigure_super+0x219/0x8a0 fs/super.c:977 do_remount fs/namespace.c:2741 [inline] path_mount+0xe13/0x1020 fs/namespace.c:3400 do_mount fs/namespace.c:3421 [inline] __do_sys_mount fs/namespace.c:3629 [inline] __se_sys_mount+0x2e3/0x3d0 fs/namespace.c:3606 do_syscall_x64 arch/x86/entry/common.c:46 [inline] do_syscall_64+0x4c/0xa0 arch/x86/entry/common.c:76 entry_SYSCALL_64_after_hwframe+0x68/0xd2 RIP: 0033:0x7ff1ad99da8a Code: 48 c7 c2 e8 ff ff ff f7 d8 64 89 02 b8 ff ff ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 e8 ff ff ff f7 d8 64 89 01 48 RSP: 002b:00007ff1ae903e58 EFLAGS: 00000246 ORIG_RAX: 00000000000000a5 RAX: ffffffffffffffda RBX: 00007ff1ae903ee0 RCX: 00007ff1ad99da8a RDX: 0000200000000940 RSI: 0000200000001cc0 RDI: 0000000000000000 RBP: 0000200000000940 R08: 00007ff1ae903ee0 R09: 0000000001a4a438 R10: 0000000001a4a438 R11: 0000000000000246 R12: 0000200000001cc0 R13: 00007ff1ae903ea0 R14: 0000000000000000 R15: 00002000000008c0 (syz.2.181,5557,1):ocfs2_parse_options:1458 ERROR: Invalid heartbeat mount options